scispace - formally typeset
Book ChapterDOI

Service Provisioning in Cloud: A Systematic Survey

01 Jan 2017-Advances in intelligent systems and computing (Springer, Singapore)-Vol. 568, pp 37-63
Abstract: Cloud Computing is all about delivering services over the Internet. It has some technical, business and economical aspects. The complexity of service provisioning has increased significantly with the increasing number of cloud services and their providers. This creates a complex situation and as a result the service provisioning techniques face hurdles. The challenge of service provisioning is to properly offer services by adjusting the complexities efficiently. There are significant works to solve the problem in different manners. But still there are some gaps that are to be noticed and bridged for future advancement of cloud technology research. In this paper an attempt has been made for analyzing the service provisioning techniques from different perspectives. The said perspectives are various techniques and methodologies, QoS parameter considered, context awareness, etc. Moreover, the role of a broker in this context is also addressed. The overall motivation is to identify the open challenges, that may provide a future research direction in context of service provisioning.

...read more

Topics: Cloud computing (61%), Context awareness (56%), Quality of service (54%) ...read more
Citations
More filters

He Yuan Huang1, Bin Wang1, Xiao Xi Liu1, Jing Min Xu1Institutions (1)
01 Jan 2010-
Abstract: As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. For service providers, typical pairwise identity federation solutions are not scalable to support single sign-on, service composition, etc. among services for large environment like service cloud. This paper proposes an identity federation broker that introduces a trusted third party as a trust broker to simplify the management of identity federation in a user centric manner. With this solution, the cost and risk of federated identity management for both enterprises and service providers could be significantly reduced. A detailed scenario implementation is given to demonstrate the feasibility of the solution. Moreover, the vulnerability analysis shows how the solution can resist the typical security attacks.

...read more

32 citations


Journal ArticleDOI
22 May 2020-
TL;DR: This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security, and open research issues are provided for future research development.

...read more

Abstract: In recent years, cloud computing is an emergent field in the Internet era. There is rapid development in high-performance computing and technology extended from grid computing to cloud computing to provide computing resources on pay per basis. Cloud service providers developed applications for users to easily access cloud services with quality of service (QoS) because cloud application plays an important role in service delivery of cloud organization. This paper provides a review of cloud computing technology, cloud models, deployment and cloud applications such as types of applications, reliability, and security. Finally, open research issues are provided for future research development.

...read more

6 citations


Posted Content
Hoda Taheri1, Faeze Ramezani1, Neda Mohammadi1, Parisa Khoshdel1  +4 moreInstitutions (1)
Abstract: The current systematic review includes a comprehensive 3-tier strategy (manual search, backward snowballing, and database search). The accuracy of the search methodology has been analyzed in terms of extracting related studies and collecting comprehensive and complete information in a supplementary file. In the search methodology, qualitative criteria have been defined to select studies with the highest quality and the most relevant among all search spaces. Also, some queries have been created using important keywords in the field under study in order to find studies related to the field of the cloud broker. Out of 1928 extracted search spaces, 171 search spaces have been selected based on defined quality criteria. Then, 1298 studies have been extracted from the selected search spaces and have been selected 496 high-quality papers published in prestigious journals, conferences, and workshops that the advent of them have been from 2009 until the end of 2019. In Systematic Mapping Study (SMS), 8 research questions have been designed to achieve goals such as identifying the most important and hottest topics in the field of cloud broker, identifying existing trends and issues, identifying active researchers and countries in the cloud broker field, a variety of commonly used techniques in building cloud brokers, variety of evaluation methods, the amount of research conducted in this field by year and place of publication and the identification of the most important active search spaces.

...read more

1 citations


References
More filters

Proceedings ArticleDOI
Gregory D. Abowd, Anind K. Dey, Peter J. Brown1, Nigel Davies2  +2 moreInstitutions (4)
27 Sep 1999-
TL;DR: Some of the research challenges in understanding context and in developing context-aware applications are discussed, which are increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly.

...read more

Abstract: When humans talk with humans, they are able to use implicit situational information, or context, to increase the conversational bandwidth. Unfortunately, this ability to convey ideas does not transfer well to humans interacting with computers. In traditional interactive computing, users have an impoverished mechanism for providing input to computers. By improving the computer’s access to context, we increase the richness of communication in human-computer interaction and make it possible to produce more useful computational services. The use of context is increasingly important in the fields of handheld and ubiquitous computing, where the user?s context is changing rapidly. In this panel, we want to discuss some of the research challenges in understanding context and in developing context-aware applications.

...read more

4,734 citations


Proceedings ArticleDOI
Eduardo Cuervo1, Aruna Balasubramanian2, Dae-Ki Cho3, Alec Wolman4  +3 moreInstitutions (4)
15 Jun 2010-
TL;DR: MAUI supports fine-grained code offload to maximize energy savings with minimal burden on the programmer, and decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device's current connectivity constrains.

...read more

Abstract: This paper presents MAUI, a system that enables fine-grained energy-aware offload of mobile code to the infrastructure. Previous approaches to these problems either relied heavily on programmer support to partition an application, or they were coarse-grained requiring full process (or full VM) migration. MAUI uses the benefits of a managed code environment to offer the best of both worlds: it supports fine-grained code offload to maximize energy savings with minimal burden on the programmer. MAUI decides at run-time which methods should be remotely executed, driven by an optimization engine that achieves the best energy savings possible under the mobile device's current connectivity constrains. In our evaluation, we show that MAUI enables: 1) a resource-intensive face recognition application that consumes an order of magnitude less energy, 2) a latency-sensitive arcade game application that doubles its refresh rate, and 3) a voice-based language translation application that bypasses the limitations of the smartphone environment by executing unsupported components remotely.

...read more

2,370 citations


Journal ArticleDOI
TL;DR: Everyday computing is proposed, a new area of applications research, focussed on scaling interaction with respect to time, just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers.

...read more

Abstract: The proliferation of computing into the physical world promises more than the ubiquitous availability of computing infrastructure; it suggest new paradigms of interaction inspired by constant access to information and computational capabilities. For the past decade, application-driven research on abiquitous computing (ubicomp) has pushed three interaction themes:natural interfaces, context-aware applications,andautomated capture and access. To chart a course for future research in ubiquitous computing, we review the accomplishments of these efforts and point to remaining research challenges. Research in ubiquitious computing implicitly requires addressing some notion of scale, whether in the number and type of devices, the physical space of distributed computing, or the number of people using a system. We posit a new area of applications research, everyday computing, focussed on scaling interaction with respect to time. Just as pushing the availiability of computing away from the traditional desktop fundamentally changes the relationship between humans and computers, providing continuous interaction moves computing from a localized tool to a constant companion. Designing for continous interaction requires addressing interruption and reumption of intreaction, representing passages of time and providing associative storage models. Inherent in all of these interaction themes are difficult issues in the social implications of ubiquitous computing and the challenges of evaluating> ubiquitious computing research. Although cumulative experience points to lessons in privacy, security, visibility, and control, there are no simple guidelines for steering research efforts. Akin to any efforts involving new technologies, evaluation strategies form a spectrum from technology feasibility efforts to long-term use studies—but a user-centric perspective is always possible and necessary

...read more

1,512 citations


4


07 Sep 2004-
TL;DR: This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing, reviewed, classified relative to their core elements and evaluated with respect to their appropriateness.

...read more

Abstract: Context-awareness is one of the drivers of the ubiquitous computing paradigm, whereas a well designed model is a key accessor to the context in any context-aware system This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing Numerous approaches are reviewed, classified relative to their core elements and evaluated with respect to their appropriateness for ubiquitous computing

...read more

1,301 citations



Network Information
Related Papers (5)
03 Apr 2014

Verena Kantere

04 Dec 2014

George Feuerlicht, Hong Thai Tran

01 Jan 2018

Angira Ghosh Chowdhury, Ajanta Das

Performance
Metrics
No. of citations received by the Paper in previous years
YearCitations
20211
20201
20101